Publicado por LAP LAMBERT Academic Publishing, 2019
ISBN 10: 6139459710 ISBN 13: 9786139459711
Idioma: Inglés
Librería: Buchpark, Trebbin, Alemania
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: Hervorragend. Zustand: Hervorragend | Seiten: 92 | Sprache: Englisch | Produktart: Bücher.
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 47,95
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.
Librería: California Books, Miami, FL, Estados Unidos de America
EUR 59,50
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New.
Publicado por GRIN Verlag, GRIN Verlag Mai 2019, 2019
ISBN 10: 3668943400 ISBN 13: 9783668943407
Idioma: Inglés
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 47,95
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation. After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function.BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt 88 pp. Englisch.
Publicado por LAP LAMBERT Academic Publishing Mär 2019, 2019
ISBN 10: 6139459710 ISBN 13: 9786139459711
Idioma: Inglés
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
EUR 54,90
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Neuware -In this work we recognize di¿erent types of attacks at di¿erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely äects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis ¿rst provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA).Books on Demand GmbH, Überseering 33, 22297 Hamburg 92 pp. Englisch.
Librería: preigu, Osnabrück, Alemania
EUR 47,95
Convertir monedaCantidad disponible: 5 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. Detection of Primary User Emulation Attack in Cognitive Radio Networks based on TDOA using Novel Bat Algorithm | Aasia Rehman | Taschenbuch | 92 S. | Englisch | 2019 | GRIN Verlag | EAN 9783668943407 | Verantwortliche Person für die EU: BoD - Books on Demand, In de Tarpen 42, 22848 Norderstedt, info[at]bod[dot]de | Anbieter: preigu.
Publicado por LAP LAMBERT Academic Publishing, 2019
ISBN 10: 6139459710 ISBN 13: 9786139459711
Idioma: Inglés
Librería: Revaluation Books, Exeter, Reino Unido
EUR 99,02
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Brand New. 92 pages. 8.66x5.91x0.21 inches. In Stock.
Publicado por LAP LAMBERT Academic Publishing, 2019
ISBN 10: 6139459710 ISBN 13: 9786139459711
Idioma: Inglés
Librería: dsmbooks, Liverpool, Reino Unido
EUR 155,29
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritopaperback. Condición: New. New. book.
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 47,95
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Master's Thesis from the year 2017 in the subject Computer Science - General, grade: 8.63, , course: M. Tech - Cognitive Radio Networks, language: English, abstract: Cognitive Radio Network (CRN) Technology makes the efficient utilization of scarce spectrum resources by allowing the unlicensed users to opportunistically use the licensed spectrum bands. Cognitive Radio Technology has gained a lot of attention from the researchers over the years however insufficient research has been done related to its security. Cognitive Radio Network due to its flexible and open nature is vulnerable to a number of security attacks. In this thesis we recognize different types of attacks at different layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely affects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). A number of cooperative secondary users are used for detecting the PUEA by comparing its estimated position with the known position of incumbent. The main goal of Novel Bat Algorithm (NBA) is to minimize two fitness functions namely non-linear least square (NLS) and the maximum likelihood (ML) in order to optimize the error in estimation.After evaluation, simulation results clearly demonstrates that NBA results in reduced estimation error as compared to Taylor Series Estimation (TSE) and Particle Swarm Optimization (PSO) and it also needs smaller number of secondary users for cooperation. Also maximum likelihood function performs better than non-linear least square function. 92 pp. Englisch.
Publicado por LAP LAMBERT Academic Publishing, 2019
ISBN 10: 6139459710 ISBN 13: 9786139459711
Idioma: Inglés
Librería: moluna, Greven, Alemania
EUR 45,45
Convertir monedaCantidad disponible: Más de 20 disponibles
Añadir al carritoCondición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Autor/Autorin: Rehman AasiaThe author is pursuing PhD in Computer Science at University of Kashmir, Srinagar. She has been awarded M.Tech in CSE from Shri Mata Vaishno Devi University, Jammu and B.Tech in CSE from University of Kashmir, Srinagar.
Publicado por LAP LAMBERT Academic Publishing Mrz 2019, 2019
ISBN 10: 6139459710 ISBN 13: 9786139459711
Idioma: Inglés
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
EUR 54,90
Convertir monedaCantidad disponible: 2 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -In this work we recognize di erent types of attacks at di erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely a ects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA). 92 pp. Englisch.
Publicado por LAP LAMBERT Academic Publishing, 2019
ISBN 10: 6139459710 ISBN 13: 9786139459711
Idioma: Inglés
Librería: AHA-BUCH GmbH, Einbeck, Alemania
EUR 55,56
Convertir monedaCantidad disponible: 1 disponibles
Añadir al carritoTaschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In this work we recognize di erent types of attacks at di erent layers of protocol stack. This thesis is mainly concerned with one of the physical layer attack called Primary User Emulation Attack and its detection. PUE Attack adversely a ects the CRN performance and can also sometimes lead to Denial of Service to CR networks. In Primary User Emulation Attack the attacker imitates the signal characteristics of the Primary User. This thesis first provides introduction to CRN, its architecture and sensing techniques and also discusses various attacks and their counter measures. Then it mainly focuses on PUE attack and examines its mitigation techniques. This thesis solves the problem of PUE attack by localization technique based on TDOA measurements with reduced error in location estimation using a Novel Bat Algorithm (NBA).